Traffic Management. Aerospace and Electronic Sys-
tems Magazine, 32(11):22–33.
Blanchet, B. (2017). Symbolic And Computational Mecha-
nized Verification Of The ARINC823 Avionic Proto-
cols. In 30th Computer Security Foundations Sympo-
sium (CSF), pages 68–82. IEEE.
Boyd, C., Mathuria, A., and Stebila, D. (2020). Protocols
For Authentication And Key Establishment. Springer.
Crowe, B. (2016). Proposed AeroMACS PKI Specifica-
tion Is A Model For Global And National Aeronauti-
cal PKI Deployments. In WiMAX Forum at 16th Inte-
grated Communications, Navigation and Surveillance
Conference (ICNS), pages 1–19. IEEE.
Dolev, D. and Yao, A. (1981). On The Security Of Pub-
lic Key Protocols (Extended Abstract). In 22nd An-
nual Symposium on Foundations of Computer Sci-
ence, pages 350–357. IEEE Computer Society.
Goldwasser, S., Micali, S., and Rivest, R. (1988). A
Digital Signature Scheme Secure Against Adaptive
Chosen-Message Attacks. SIAM Journal on comput-
ing, 17(2):281–308.
Gr
¨
aupl, T., Rihacek, C., and Haindl, B. (2020).
LDACS A/G Specification. SESAR2020 PJ14-02-01
D3.3.030, German Aerospace Center (DLR).
International Civil Aviation Organization (ICAO) (2015).
Doc 9896 — Manual On The Aeronautical Telecom-
munication Network (ATN) Using Internet Proto-
col Suite (IPS) Standards And Protocols. Techni-
cal report, International Civil Aviation Organization
(ICAO).
International Civil Aviation Organization (ICAO) (2018a).
Finalization of LDACS Draft SARPs - Working Paper
WP05 including Appendix. Technical report, Interna-
tional Civil Aviation Organization (ICAO), Montreal,
Canada.
International Civil Aviation Organization (ICAO) (2018b).
Finalization Of LDACS Draft SARPs - Working Paper
WP05 Including Appendix. Technical report, Interna-
tional Civil Aviation Organization (ICAO).
Krawczyk, H. (2010). Cryptographic Extraction And Key
Derivation: The HKDF Scheme. In Annual Cryptol-
ogy Conference, pages 631–648. Springer.
Mahmoud, M. S. B., Pirovano, A., and Larrieu, N. (2014).
Aeronautical Communication Transition From Ana-
log To Digital Data: A Network Security Survey.
Computer Science Review, 11-12:1–29.
M
¨
aurer, N., Gr
¨
aupl, T., Bellido-Manganell, M., Mielke, D.,
Filip-Dhaubhadel, A., Heirich, O., Gerbeth, D., Felux,
M., Schalk, L., Becker, D., Schneckenburger, N., and
Schnell, M. (2021a). Flight Trial Demonstration of
Secure GBAS via the L-band Digital Aeronautical
Communications System (LDACS). IEEE Aerospace
and Electronic Systems Magazine, pages 8–17.
M
¨
aurer, N., Gr
¨
aupl, T., and Schmitt, C. (2021b). Cyberse-
curity For The L-band Digital Aeronautical Commu-
nications System (LDACS). In Song, H., Hopkinson,
K., Cola, T. d., Alexandrovich, T., and D., L., editors,
Aviation Cybersecurity: Foundations, Principles, and
Applications, pages 1–38. Institution of Engineering
and Technology (IET).
M
¨
aurer, N. and Schmitt, C. (2019). Towards Successful Re-
alization Of The LDACS Cybersecurity Architecture:
An Updated Datalink Security Threat- and Risk Anal-
ysis. In 19th Integrated Communications, Navigation
and Surveillance Conference (ICNS), pages 1A2/1–
1A2–13. IEEE.
M
¨
aurer, N. and Bilzhause, A. (2018). A Cybersecurity Ar-
chitecture For The L-band Digital Aeronautical Com-
munications System (LDACS). In 37th Digital Avion-
ics Systems Conference (DASC), pages 1–10. IEEE.
Meier, S., Schmidt, B., Cremers, C., and Basin, D. (2013).
The TAMARIN Prover For The Symbolic Analysis Of
Security Protocols. In 25th International Conference
on Computer Aided Verification (CAV), page 696–701.
Springer.
Patel, V. (2016). ICAO Air-Ground Security Standards Sta-
tus ICNS Conference 2016. In Integrated Commu-
nications Navigation and Surveillance (ICNS), pages
1–31. IEEE.
Roosa, S. and Schultze, S. (2013). Trust Darknet: Control
And Compromise In The Internet’s Certificate Au-
thority Model. IEEE Internet Computing, 17(3):18–
25.
Schnell, M., Epple, U., Shutin, D., and Schneckenburger,
N. (2014). LDACS: Future Aeronautical Communi-
cations For Air-Traffic Management. IEEE Commu-
nications Magazine, 52(5):104–110.
Yao, A. (1982). Theory And Application Of Trapdoor Func-
tions. In 23rd Annual Symposium on Foundations of
Computer Science (SFCS), pages 80–91. IEEE.
APPENDIX
AeroMACS Aeronautical Mobile Airport
Communication System
AOC Aeronautical Operational Control
AS Aircraft Station
ATN Aeronautical Telecommunications
Network
ATS Air Traffic Services
BCCH Broadcast Control Channel
CCCH Common Control Channel
CPDLC Controller–Pilot Data Link
Communications
DCH Data Channel
DHKE Diffie-Hellman Key Exchange
GS Ground Station
ICAO International Civil Aviation
Organization
KDF Key Derivation Function
LDACS L-band Digital Aeronautical
Communications System
MAKE Mutual Authentication and Key
Establishment
PKI Public Key Infrastructure
RACH Random Access Channel
STS Station to Station
SECRYPT 2021 - 18th International Conference on Security and Cryptography
610